Spotlight falls on Sony’s troubled cybersecurity

FILE – This is a Thursday, May 26, 2011 file photo of people walking by Sony Building in Tokyo’s Ginza shopping district in Tokyo. Another massive data breach at Sony has left hackers exulting, customers steaming and security experts questioning why basic fixes haven’t been made to the company’s stricken cybersecurity program. (AP Photo/Shizuo Kambayashi, File)

LONDON (AP) — Another massive data breach at Sony has left hackers exulting, customers steaming and security experts questioning why basic fixes haven’t been made to the company’s stricken cybersecurity program.

Hackers say they managed to steal a massive trove of personal information from Sony Pictures’ website using a basic technique which they claim shows how poorly the company guards its users’ secrets. Security experts agreed Friday, saying the company’s security was bypassed by a well-known attack method by which rogue commands are used to extract sensitive data from poorly constructed websites.

“Any website worth its salt these days should be built to withstand such attacks,” said Graham Cluley, of Web security firm Sophos. Coming on the heels of a massive security breach that compromised more than 100 million user accounts associated with Sony’s PlayStation and online entertainment networks, Cluley said the latest attack suggested that hackers were lining up to give the company a kicking.

“They are becoming the whipping boy of the computer underground,” he said.

In a joint statement from Michael Lynton, Chairman and Chief Executive Officer, and Amy Pascal, Co-Chairman, Sony Pictures Entertainment on Friday night acknowledged the breach and said the company had taken action “to protect against further intrusion.”

“We have also retained a respected team of experts to conduct the forensic analysis of the attack,” the statement said. It did not go into details about specific actions that will be taken to prevent future security breaches.

It wasn’t clear how many people were affected. The hackers, who call themselves Lulz Security — a reference to the Internetspeak for “laugh out loud”– boasted of compromising more than 1 million users’ personal information — although it said that a lack of resources meant it could only leak a selection on the Web. Their claim could not be independently verified, but several people whose details were posted online confirmed their identities to The Associated Press.

Lulz Security ridiculed California-based Sony for the ease with which it stole the data, saying that the company stored peoples’ passwords in a simple text file — something it called “disgraceful and insecure.”

Several emails sent to accounts associated with the hackers as well as messages posted to the microblogging site Twitter were not returned, but in one of its tweets Lulz Security expressed no remorse.

“Hey innocent people whose data we leaked: blame Sony,” it said.

Sony’s customers — many of whom had given the company their information for sweepstakes draws — appeared to agree.

Tim Rillahan, a 39-year-old computer instructor in Ohio, said he was extremely upset to find his email address and password posted online for “the whole world to see.”

“I have since been changing my passwords on every site that uses a login,” he said in an email Friday. “Sony stored our passwords in plain text instead of encrypting the information. It shows little respect to us, their customers.”

He and others complained that they had yet to hear from the company about the breach, news of which is nearly a day old.

John Bumgarner, the chief technology officer for the U.S. Cyber Consequences Unit — a research group devoted to monitoring Internet threats — was emphatic when asked whether users’ passwords could be left unencrypted.

“Never, never, never,” he said. “Passwords should always be hashed. Some kind of encryption should be used.”

Bumgarner, who’s been critical of Sony’s security in the past, said the company needed to take a hard look at how it safeguards its data.

“It’s time for Sony to press the reset button on their cybersecurity program before another incident occurs,” he said.